To get the most out of this book
You need a basic knowledge of cybersecurity and networking to get the most out of this book. For practical exercises, you need the SANS SIFT workstation installed as a virtual machine or in any UNIX-based operating system, such as Ubuntu or Kali Linux. SIFT workstation comes with the necessary tools for security analysis. You need the MISP virtual machine and the Anomali STAXX platform to do the practicals in Chapter 15, Threat Intelligence Sharing and Cyber Activity Attribution - Practical Use Cases.
All the commands are executed directly on the guest platforms mentioned here or the host environment terminal. We have used a Windows 10 host environment.
Note that the book also explains the steps required to get you ready for practical exercises.